A woman in Attleboro takes an at-home test and finds out she’s pregnant. She looks up nearby reproductive health clinics and finds one: Four Women Health Services, which has also been providing abortions for decades. She sends a request through an online chat on Four Women’s website to set up an ultrasound appointment.

Less than half an hour later, she receives a call to schedule an appointment and books one.

But the person who just called her doesn’t work for Four Women. They called to book her an appointment at the center across the street: Attleboro Women’s Health Center, or Abundant Hope.

That’s what allegedly happened last October. Four Women is now suing in federal court, alleging that at least four potential patients apparently had their messages intercepted by Attleboro Women’s Health Center — an entity that is not a licensed health care facility and does not provide abortions.

  • Maeve@kbin.earth
    link
    fedilink
    arrow-up
    5
    arrow-down
    1
    ·
    3 months ago

    I hope CMS works with the clinic to improve information handling, rather than fining it out of existence.

    • HikingVet@lemmy.ca
      link
      fedilink
      arrow-up
      11
      arrow-down
      1
      ·
      3 months ago

      Are you saying the clinic that illegally intercepted communication that wasn’t meant for them and wouldn’t have provided ALL info and options should get a pat on the wrist, rather than receive punishment for deceitful actions?

      I know where I stand and it should be fined out of existence for pushing its christo-fascist bullshit.

      • Q*Bert Reynolds@sh.itjust.works
        link
        fedilink
        arrow-up
        10
        ·
        3 months ago

        Well, one is a clinic and the other isn’t a licensed health care facility at all, so I think OP was expressing worry that the abortion clinic would be fined out of existence for HIPAA violations related to not properly securing patient data.

        • HikingVet@lemmy.ca
          link
          fedilink
          arrow-up
          4
          ·
          3 months ago

          The way I read it was that the patient was deceived by a website put up by the “not clinic”. It’s a recognised tactic that they use.

          • Q*Bert Reynolds@sh.itjust.works
            link
            fedilink
            arrow-up
            9
            ·
            edit-2
            3 months ago

            That’s not at all what the article says. These women went to the actual Four Women’s Health Services website, filled out a form, and were contacted by someone who didn’t work at Four Women’s to schedule an appointment elsewhere.

            Edit: In the article, their lawyer says, “AWHC’s outreach to Four Women’s patients appears to be the result of their unlawful infiltration of Four Women’s electronic platforms.” Later in the article, a spokesperson for the EFF says what’s more likely is that an employee is intentionally leaking data. Either way, there’s no indication that this is the result of pregnant women being duped by a website.

            • partial_accumen@lemmy.world
              link
              fedilink
              arrow-up
              3
              ·
              3 months ago

              In IT systems that I’ve been a part of that manage HIPAA data, there are access controls and audit trails required for compliance. The fact that the victims are receiving calls within mere hours of posting the request should make a very short audit trail. What will turn up is either the perpetrator’s user account, or possibly a non-related worker that had compromised account credentials (username/password). Even then it will show access from a specific IP address, and that IP address can be audited back to which piece of hardware (desktop, laptop, tablet) had that IP address at that time. From that point there are cameras and timeclock tracking.

              Since this has happened more than once, it is unlikely the exact same staff has been working at the same time for all the recorded incidents of leaks. Its a process of elimination problem at that point. Example using fake names of workers:

              Leak 1 workers:

              • Brie
              • Noah
              • Fatima
              • Dennis

              Leak 2 workers:

              • Noah
              • Fatima
              • Dennis
              • Maria

              Leak 3 workers:

              • Brie
              • Dennis
              • Maria
              • Sofia

              Leak 4 workers:

              • Dennis
              • Maria
              • Sofia
              • Miguel

              The leaker is Dennis as he is the only worker that was there on all 4 shifts when the request came in.